Abstract

The global energy Internet standard support system plays a vital role in global energy interconnection. However, the system brings convenience to the global energy interconnection and introduces new security issues. Due to the diversity of users, the complexity of the environment and the internationalization, there will be more and more malicious network intrusions from outside and inside. The security system of the global energy Internet standard support system faces great challenges. To this end, this paper proposes a security architecture that combines active and passive, establishing a chain of trust between the active security architecture and the passive security architecture, ensuring a new security architecture, a security organization framework, a security policy framework, a security operation framework, and a closed-loop system that integrates the security technology framework. A deep learning algorithm was introduced for network intrusion learning to achieve sustainable management of the information security life cycle. The combination of active and passive security systems and continuous monitoring strategies based on deep learning fully ensure the security of the global energy Internet standard support system.

Highlights

  • In the 20th century, human beings entered the electrical age, and the power system became the infrastructure of human industrial life

  • The combination of active and passive security systems and continuous monitoring strategies based on deep learning fully ensure the security of the global energy Internet standard support system

  • Based on the design goals and basic principles of the global energy Internet standard support system security architecture, this paper proposes a security architecture that combines active and passive technologies, establishes a chain of trust between the active security architecture and the passive security architecture to ensure new security

Read more

Summary

Introduction

In the 20th century, human beings entered the electrical age, and the power system became the infrastructure of human industrial life. In the construction and development of the global energy Internet industry, it is of vital importance to establish a standard support system for the unified regulation of the global energy Internet. The combination of active and passive security systems and continuous monitoring strategies based on deep learning fully ensure the security of the global energy Internet standard support system. Providing a stable and reliable security system and powerful information technology for the development of global energy Internet standards work is of vital importance for maintaining the safe and smooth operation of the global energy Internet international standard information system. -Initiative and passive safety system architecture are combined to ensure the safe operation of global energy Internet standard system. For passive safety system, the topological relation is built from three aspects with safety standards, safety management and safety technology. A chain of trust is established between the active and passive security system topology diagrams, for building a master-passive integrated security defense system. In the active defense system, the deep learning algorithm is used to learn the intrusion behavior in real time, and the model is used to monitor the real-time system security performance to achieve intelligent early warning

Security architecture objectives and principles
Security Architecture Design Goals
Basic principles of security architecture design
Active Security Defense Architecture
Passive Security Defense System Architecture
Global Energy Internet Active and Passive Security System Model Architecture
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.